• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption

Vol. 14, No. 5, May 31, 2020
10.3837/tiis.2020.05.022, Download Paper (Free):

Abstract

In this paper we first propose a new cryptosystem based on our data hiding scheme (2,9,8) introduced in 2019 with high security, where encrypting and hiding are done at once, the ciphertext does not depend on the input image size as existing hybrid techniques of cryptography and steganography. We then exploit our automata approach presented in 2019 to design two algorithms for exact and approximate pattern matching on secret data encrypted by our cryptosystem. Theoretical analyses remark that these algorithms both have O(n) time complexity in the worst case, where for the approximate algorithm, we assume that it uses (1))mε−processors, where ε, m and n are the error of our string similarity measure and lengths of the pattern and secret data, respectively. In searchable encryption, our cryptosystem is used by users and our pattern matching algorithms are performed by cloud providers.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
N. H. Truong, "A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption," KSII Transactions on Internet and Information Systems, vol. 14, no. 5, pp. 2258-2274, 2020. DOI: 10.3837/tiis.2020.05.022.

[ACM Style]
Nguyen Huy Truong. 2020. A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption. KSII Transactions on Internet and Information Systems, 14, 5, (2020), 2258-2274. DOI: 10.3837/tiis.2020.05.022.

[BibTeX Style]
@article{tiis:23568, title="A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption", author="Nguyen Huy Truong and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2020.05.022}, volume={14}, number={5}, year="2020", month={May}, pages={2258-2274}}